Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Social networks

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Extremists Co-Opt Hurricane Response to Blame Israel, Incite a Storm of Hateful Narratives

    Right-wing extremists have been exploiting the devastation surrounding Hurricane Helene — a storm that has so far claimed the lives of at least 230 people in the southeast U.S.— and now Hurricane Milton, to advance antisemitic or anti-Israel conspiracy theories that federal disaster assistance has been slow or inadequate because they believe the U.S. is sending funds and personnel to Israel instead.

    • Read more
  • How Foreign Operations Are Manipulating Social Media to Influence Your Views

    Foreign influence campaigns, or information operations, have been widespread in the run-up to the 2024 U.S. presidential election. Influence campaigns aim to shift public opinion, push false narratives or change behaviors among a target population. Russia, China, Iran, Israel and other nations have run these campaigns by exploiting social bots, influencers, media companies and generative AI.

    • Read more
  • Governments Respond to Multiple Claims on Helene

    Bad actors coming in behind hurricanes in North Carolina to spread false claims is nothing new. This time, the White House felt the need to respond.

    • Read more
  • Fact-Checking the Viral Conspiracies in the Wake of Hurricane Helene

    Buoyed by firebrands like Alex Jones and Marjorie Taylor Greene, Helene stirred up a toxic stew of conspiracy theories and culture war politics.

    • Read more
  • Some Online Conspiracy-Spreaders Don’t Even Believe the Lies They’re Spewing

    There has been a lot of research on the types of people who believe conspiracy theories, and their reasons for doing so. But there’s a wrinkle: My colleagues and I have found that there are a number of people sharing conspiracies online who don’t believe their own content.

    • Read more
  • Online Misinformation Most Likely to Be Believed by Ideological Extremists: Study

    There has been a dramatic rise of online misinformation, but the influence of misinformation is not universal. Rather, users with extreme political views are more likely than are others to both encounter and believe false news.

    • Read more
  • Online Signals of Extremist Mobilization

    Olivia Brown’s study analyses the online behaviors of individuals who mobilized to right-wing extremist action, revealing that discussions about violent actions and logistical planning, rather than ideological content, are key indicators of mobilization.

    • Read more
  • Research Showing Facebook's News-Feed Algorithm Curbs Election Misinformation Debunked

    Though Facebook can limit untrustworthy content, new research suggests it often chooses not to. A flawed Meta-funded research helped to create the misperception, widely reported by the media, that Facebook and Instagram’s news feeds are largely reliable sources of trustworthy news.

    • Read more
  • Neo-Nazi Telegram Users Panic Amid Crackdown and Arrest of Alleged Leaders of Online Extremist Group

    An analysis by ProPublica and FRONTLINE shows a surge in activity on Telegram channels aligned with the Terrorgram Collective, as allies tried to rally support for their comrades in custody and sought to oust users they believed to be federal agents.

    • Read more
  • California Laws Target Deepfake Political Ads, Disinformation

    California Governor Gavin Newsom has signed three pieces of legislation restricting the role that artificial intelligence, specifically deepfake audio and video recordings, can play in election campaigns.

    • Read more
  • Toll of QAnon on Families of Followers

    Political conspiracy theories have long found receptive audiences in the U.S., often on the fringes of society. Among the best-known today is QAnon, a set of fabricated claims that a group of Satan-worshiping pedophiles controls American politics and media. At its center is an anonymous oracle known as “Q.” New book by Nieman Fellow explores pain, frustration in efforts to help loved ones break free of hold of conspiracy theorists.

    • Read more
  • Five Disinformation Tactics Russia Is Using to Try to Influence the U.S. Election

    The White House’s recent exposure of Russian attempts to influence this year’s U.S. presidential election will come as little surprise to anyone who followed disinformation tactics during the last U.S. election. The practices alleged by DOJ has become standard practice in Russian attempts to influence international audiences.

    • Read more
  • The Accelerationists’ App: How Telegram Became the “Center of Gravity” for a New Breed of Domestic Terrorists

    From attempting to incite racially motivated violence to encouraging attacks on critical infrastructure, the alleged crimes planned and advertised by extremists on Telegram go far beyond the charges facing CEO Pavel Durov.

    • Read more
  • Conspiracy, Fake News, Crime: Why Is Telegram Controversial?

    Telegram has been used by all sides in Russia, both pro-and anti-government groups. The arrest of CEO Pavel Durov in Paris has left Russia’s opposition worried. But the messaging app is well known for its drawbacks.

    • Read more
  • As Tools for Hybrid Threats, Apps Like Telegram Must Be Accountable

    Once celebrated as the ultimate tool for free communication thanks to its encryption and lax moderation practices, Telegram now stands accused by French authorities of facilitating criminal activities and possibly being exploited for hybrid threats, particularly by Russian state actors. Hybrid threats blend military force with non-military tactics including cyberattacks and disinformation.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Homeland Security Secretary Alejandro Mayorkas says election disinformation is "extremely damaging"
  • Texas sues Google over biometric recognition features
  • False QAnon Conspiracies in Politics: What to Watch Out for Ahead of the Midterms
  • The Shady Site That Shows Anti-Vaxxers Will Believe Anything
  • The Role for DHS in Countering the Disinformation Threat
  • Bipartisan Bill Eyes DHS Task Force to Combat Deepfakes
  • This startup works with Facebook and Google to steer internet users away from misinformation. Get an exclusive look at the pitch deck it used to land $7 million from VCs.
  • Challenges in Combating Terrorism and Extremism Online
  • DHS Launches Warning System to Detect Online Security Threats
  • Apple says Parler can return to iPhones after the app makes some changes.
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies